Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: Hangzhou Alibaba Advertising Co.,Ltd.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 8.129.77.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42560
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;8.129.77.68.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019042400 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Thu Apr 25 00:21:56 +08 2019
;; MSG SIZE  rcvd: 115

Host info
Host 68.77.129.8.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 68.77.129.8.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
91.241.19.213 attackspam
2020-03-13T21:28:16Z - RDP login failed multiple times. (91.241.19.213)
2020-03-14 07:58:31
167.71.254.95 attackspambots
Invalid user yueyimin from 167.71.254.95 port 51278
2020-03-14 08:12:20
222.186.31.83 attackbots
13.03.2020 23:45:49 SSH access blocked by firewall
2020-03-14 07:54:09
154.223.171.100 attackbots
Mar 13 22:47:34 [host] sshd[5071]: pam_unix(sshd:a
Mar 13 22:47:36 [host] sshd[5071]: Failed password
Mar 13 22:55:51 [host] sshd[5139]: pam_unix(sshd:a
2020-03-14 07:44:12
222.186.173.238 attack
Mar 14 01:08:16 vps691689 sshd[8017]: Failed password for root from 222.186.173.238 port 37916 ssh2
Mar 14 01:08:29 vps691689 sshd[8017]: error: maximum authentication attempts exceeded for root from 222.186.173.238 port 37916 ssh2 [preauth]
...
2020-03-14 08:10:16
185.234.219.102 attack
Rude login attack (59 tries in 1d)
2020-03-14 07:48:40
191.163.112.156 attackbotsspam
port scan and connect, tcp 81 (hosts2-ns)
2020-03-14 08:22:05
103.242.200.38 attack
Invalid user ftpuser from 103.242.200.38 port 5582
2020-03-14 07:57:03
124.107.91.229 attack
Unauthorized connection attempt from IP address 124.107.91.229 on Port 445(SMB)
2020-03-14 07:43:23
114.88.153.172 attackspam
Mar 13 22:49:45 game-panel sshd[25677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.88.153.172
Mar 13 22:49:47 game-panel sshd[25677]: Failed password for invalid user spec from 114.88.153.172 port 28654 ssh2
Mar 13 22:58:00 game-panel sshd[25966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.88.153.172
2020-03-14 07:50:33
45.136.108.85 attackbots
Brute-force attempt banned
2020-03-14 08:19:54
222.186.175.216 attack
2020-03-14T00:20:19.988627shield sshd\[12670\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.216  user=root
2020-03-14T00:20:22.688950shield sshd\[12670\]: Failed password for root from 222.186.175.216 port 23472 ssh2
2020-03-14T00:20:26.502058shield sshd\[12670\]: Failed password for root from 222.186.175.216 port 23472 ssh2
2020-03-14T00:20:34.071181shield sshd\[12670\]: Failed password for root from 222.186.175.216 port 23472 ssh2
2020-03-14T00:20:38.033979shield sshd\[12670\]: Failed password for root from 222.186.175.216 port 23472 ssh2
2020-03-14 08:21:33
61.78.152.99 attack
Invalid user confluence from 61.78.152.99 port 49494
2020-03-14 07:46:09
68.183.19.63 attackspam
Invalid user zpsserver from 68.183.19.63 port 51916
2020-03-14 08:20:30
111.67.207.160 attackbots
2020-03-13T21:04:47.609498ionos.janbro.de sshd[41395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.207.160
2020-03-13T21:04:47.160940ionos.janbro.de sshd[41395]: Invalid user akazam from 111.67.207.160 port 35212
2020-03-13T21:04:50.242349ionos.janbro.de sshd[41395]: Failed password for invalid user akazam from 111.67.207.160 port 35212 ssh2
2020-03-13T21:07:59.252138ionos.janbro.de sshd[41415]: Invalid user openvpn from 111.67.207.160 port 60116
2020-03-13T21:07:59.780422ionos.janbro.de sshd[41415]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.207.160
2020-03-13T21:07:59.252138ionos.janbro.de sshd[41415]: Invalid user openvpn from 111.67.207.160 port 60116
2020-03-13T21:08:02.273818ionos.janbro.de sshd[41415]: Failed password for invalid user openvpn from 111.67.207.160 port 60116 ssh2
2020-03-13T21:11:12.022673ionos.janbro.de sshd[41428]: pam_unix(sshd:auth): authentication failure; l
...
2020-03-14 08:03:54

Recently Reported IPs

85.116.197.10 182.182.114.49 221.216.99.217 63.113.30.68
81.227.100.46 117.136.57.147 190.39.148.3 123.31.12.28
111.231.98.153 187.24.234.20 197.35.157.66 219.181.186.70
191.222.153.46 164.149.91.199 196.231.81.87 171.255.218.107
39.52.180.191 84.16.227.245 116.238.23.33 115.84.92.3